Encryption FAQs

1. What is an encryption registration? How long does it take to receive a response from BIS for my encryption registration?

2. Who is required to submit an Encryption Registration, classification request or self-classification report?

3. What are my responsibilities for exporting or re-exporting encryption products where I am not the producer?

4. What should I do if I cannot obtain the encryption registration Number (ERN) or the Export Control Classification Number (ECCN) for the item from the producer or manufacturer?

5. Can a third-party applicant submit an encryption registration and self-classification report on my behalf?

6. How do I report exports and reexports of items with encryption?

7. Can I export encryption technology under License Exception ENC?

8. What is non-standard cryptography?

9. How do I complete Supplement No. 5 if I am a law firm or consultant filing on behalf of a producer of encryption items?

10. What if you are not the producer of the item or filing directly on behalf of the producer (e.g., law firm/consultant)?

11. What do I need to submit with an encryption commodity classification request in SNAP-R?

12. Is Supplement No. 6 to Part 742 required for obtaining paragraph 740.17(b)(1) authorization?

13. How do I submit a Supplement No. 8 Self-Classification Report for Encryption Items?

14. When do I file Supplement No. 8 Self-Classification Report for Encryption Items?

15. What is Note 4?

16. I have an item that was reviewed and classified by BIS and made eligible for export under paragraph (b)(3) of License Exception ENC in 2009. The encryption functionality of the item has not changed. This item is now eligible for self-classification under paragraph (b)(1) of License Exception ENC. What are my responsibilities under the new rule?

17. When do I need a deemed export license for encryption technology and source code?

18. Does the EAR definition of "OAM" include using encryption in performing network security monitoring functions?

1. What is an Encryption Registration? How long does it take to receive a response from BIS for my Encryption Registration?

Encryption registration is a prescribed set of information about a manufacturer and/or exporter of certain encryption items that must be submitted to the Bureau of Industry and Security as a condition of the authorization to export such items under License Exception ENC or as mass market items.

Advance encryption registration is required for exports and reexports of items described in paragraphs 740.17(b)(1), (b)(2), and (b)(3) and paragraphs 742.15(b)(1), and (b)(3) of the Export Administration Regulations (EAR). Registration is made through SNAP-R by submitting the questionnaire set forth in Supplement No. 5 to part 742 of the EAR (point of contact/company overview/types of products/ etc.). Registration of a manufacturer authorizes the manufacturer as well as other parties to export and reexport the manufacturers encryption products that the manufacturer has either self-classified or has had the items classified by BIS, pursuant to the provisions referenced above. A condition of the authorization is that the manufacturer must submit an annual self-classification report for relevant encryption items.

How long does it take to receive a response from BIS for my encryption registration?

Once you have properly registered with BIS, the SNAP-R system will automatically issue an Encryption Registration Number (ERN), e.g., R123456, upon submission of a request. BIS estimates that the entire registration procedure should take no more than 30 minutes.

2. Who is required to submit an encryption registration, classification request or self-classification report?

Any party who exports certain U.S.-origin encryption products may be required to submit an encryption registration, classification request and/or self-classification report; however, if a manufacturer has registered and has self-classified relevant items and/or had items classified by BIS, and has made the classifications available to other parties such as resellers and other exporters/reexporters, such other parties are not required to register, to submit a classification request, or to submit an annual self-classification report.

3. What are my responsibilities for exporting or re-exporting encryption products where I am not the product manufacturer?

Exporters or reexporters that are not producers of the encryption item can rely on the Encryption Registration Number (ERN), self-classification report or CCATS that is published by the producer when exporting or reexporting the registered and/or classified encryption item. Separate encryption registration, commodity classification request or self-classification report to BIS is NOT required.

Please continue to the next question if the information is not available from the producer or manufacturer.

4. What should I do if I cannot obtain the Encryption Registration Number (ERN) or the Export Control Classification Number (ECCN) for the item from the producer or manufacturer?

If you are not the producer and are unable to obtain the producers information or if the producer has not submitted an encryption registration, self-classification report or commodity classification for his/her products to BIS, then you must register with BIS. The registration process will require you to submit a properly completed Supplement No. 5 to part 742 and subsequent Supplement No. 8 Self Classification Report for the products. You will receive an ERN for the registered products or CCATSs as appropriate. BIS recognizes that non-producers who need to submit for encryption registration may not have all of the information necessary to complete Supplement No. 5 to part 742. Therefore, special instructions have been included in Supplement No. 5 to account for this situation.

For items described in Part 740.17(b)(2) and (b)(3) or Part 742.15(b)(3) that require the classification by BIS, the non-producer is required to submit as much of the technical information required in Supplement No. 6 to part 742 - Technical Questionnaire for Encryption Items as possible.

5. Can a third-party applicant submit an encryption registration and self-classification report on my behalf?

Yes, special instructions for this purpose are provided in paragraph (r) of Supplement No. 2 to part 748 of the EAR for this purpose. The information in block 14 (applicant) of the encryption registration screen and the information in Supplement No. 5 to part 742 must pertain to the company that seeks authorization to export and reexport encryption items that are within the scope of this rule. An agent for the exporter, such as a law firm, should not list his/her name in block 14. The agent however may submit the encryption registration and list himself/herself in block 15 (other party authorized to receive license) of the encryption registration screen in SNAP-R.

6. How do I report exports and reexports of items with encryption?

All reports (i.e., the semi-annual sales report and the annual self-classification report) must be submitted to both BIS and the ENC Encryption Request Coordinator.

An annual self-classification report is required for producers of encryption items described by paragraphs 740.17(b)(1) and 742.15(b)(1) of the EAR. The information required and instruction for this report is provided in Supplement No. 8 to Part 742-Self-Classification Report for Encryption Items. Reports are submitted to BIS and the Encryption Request Coordinator in February of each year for items exported or reexported during the previous calendar year (i.e., January 1 through December 31) pursuant to the encryption registration and applicable sections740.17(b)(1) or 742.15(b)(1) of the EAR. Annual self-classification reports are to be submitted to This email address is being protected from spambots. You need JavaScript enabled to view it. and This email address is being protected from spambots. You need JavaScript enabled to view it..

Semi-annual sales reporting is required for exports to all destinations other than Canada, and for reexports from Canada for items described under paragraphs (b)(2) and (b)(3)(iii) of section 740.17. Paragraph 740.17(e)(1(iii) contains certain exclusions from this reporting requirement. Paragraphs 740.17(e)(1)(i) and (e)(1)(ii) contains the information required and instructions for submitted the semi-annual sales reports. The first report is due no later than August 1 for sales occurring between January 1 and June 30 of the year, and the second report is due no later than February of the following year for sales occurring between July 1 and December 31 of the year. Semi-annual sales reports continue to be submitted to: This email address is being protected from spambots. You need JavaScript enabled to view it. and This email address is being protected from spambots. You need JavaScript enabled to view it..

7. Can I export encryption technology under License Exception ENC?

Yes, License Exception ENC is available for transfer of encryption technology. Specifically, paragraph 740.17(b)(2)(iv) has been amended to permit exports and reexports of encryption technology as follows:

(A) Technology for "non-standard cryptography". Encryption technology classified under ECCN 5E002 for "non-standard cryptography", to any end-user located or headquartered in a country listed in Supplement No. 3 to this part;

(B) Other technology. Encryption technology classified under ECCN 5E002 except technology for "cryptanalytic items", "non-standard cryptography" or any "open cryptographic interface," to any non-"government end-user" located in a country not listed in Country Group D:1 or E:1 of Supplement No. 1 to part 740 of the EAR.

8. What is non-standard cryptography?

Non-standard cryptography, defined in Part 772 Definition of Terms, means any implementation of cryptography involving the incorporation or use of proprietary or unpublished cryptographic functionality, including encryption algorithms or protocols that have not been adopted or approved by a duly recognized international standards body (e.g., IEEE, IETF, ISO, ITU, ETSI, 3GPP, TIA, and GSMA) and have not otherwise been published.

9. How do I complete Supplement No. 5 if I am a law firm or consultant filing on behalf of a producer or exporter of encryption items?

The information in Supplement No. 5 to Part 742must pertain to the registered company, not to the submitter. Specifically, the point of contact information must be for the registered company, not a law firm or consultant filing on behalf of the registered company.

10. What if you are not the producer of the item or filing directly on behalf of the producer (e.g., law firm/consultant)?

You may answer questions 4 and 7 in Supplement No. 5 to part 742as not applicable if your company is not the producer of the encryption item. An answer must be give for all other questions. An explanation is required when you are unsure.

11. What do I need to submit with an encryption commodity classification request in SNAP-R?

Encryption commodity classification determinations should be submitted through SNAP-R. Before entering SNAP-R, you should prepare the following supporting documents:

After accessing SNAP-R, fill-in a commodity classification determination request and upload the supporting documents into SNAP-R.

12. Is Supplement No. 6 to part 742 required for paragraph 740.17(b)(1) authorization?

If you are requesting a classification of an item is described in paragraph 740.17(b)(1) (in other words, the item is not described in either Section 740.17(b)(2) or (b)(3)), a Supplement No. 6questionnaire is not required as a supporting document. Provide sufficient information about the item (e.g., technical data sheet and/or other explanation in a separate letter of explanation) for BIS to determine that the item is described in paragraph 740.17(b)(1). If you are not sure that your product is authorized as 740.17(b)(1) and you want BIS to confirm that it is authorized under 740.17(b)(1), providing answers to the questions set forth in Supplement No. 6 to part 742 with your request should provide BIS with sufficient information to make this determination.

13. How do I submit a Supplement No. 8 Self Classification Report for Encryption Items?

The annual self-classification report must be submitted as an attachment to an e-mail to BIS and the ENC Encryption Request Coordinator. Reports to BIS must be submitted to a newly created e-mail address for these reports (This email address is being protected from spambots. You need JavaScript enabled to view it.). Reports to the ENC Encryption Request Coordinator must be submitted to its existing e-mail address (This email address is being protected from spambots. You need JavaScript enabled to view it.). The information in the report must be provided in tabular or spreadsheet form, as an electronic file in comma separated values format (CSV), only. In lieu of email, submissions of disks and CDs may be mailed to BIS and the ENC Encryption Request Coordinator.

14. When do I file Supplement No. 8 Self-Classification Report for Encryption Items?

An annual self-classification report for applicable encryption commodities, software and components exported or reexported during a calendar year (January 1 through December 31) must be received by BIS and the ENC Encryption Request Coordinator no later than February 1 the following year. If no information has changed since the previous report, an email must be sent stating that nothing has changed since the previous report or a copy of the previously submitted report must be submitted.

15. What is Note 4?

Note 4 to Category 5, Part 2 in the Commerce Control List (Supplement No. 1 to part 774) excludes an item that incorporates or uses cryptography from Category 5, Part 2 controls if the items primary function or set of functions is not information security, computing, communications, storing information, or networking, andif the cryptographic functionality is limited to supporting such primary function or set of functions. The primary function is the obvious, or main, purpose of the item. It is the function which is not there to support other functions. The communications and information storage primary function does not include items that support entertainment, mass commercial broadcasts, digital rights management or medical records management.

Examples of items that are excluded from Category 5, Part 2 by Note 4 include, but are not limited to, the following:

16. I have an item that was reviewed and classified by BIS and made eligible for export under paragraph (b)(3) of License Exception ENC in 2009. The encryption functionality of the item has not changed. This item is now eligible for self-classification under paragraph (b)(1) of License Exception ENC. What are my responsibilities under the new rule?

Your item meets the grandfathering provisions set forth in section 740.17(f)(1) of the EAR. You do not need to submit an encryption registration (Supplement No. 5), an annual self-classification report (Supplement No. 8), or semi-annual sales reports for the item.

17. When do I need a deemed export license for encryption technology and source code?

A license may be required in certain circumstances for both deemed exports and deemed reexports. For encryption items, the deemed export rules apply only to deemed exports of technology and to deemed reexports of technology and source code. There are no deemed export rules for transfers of encryption source code to foreign nationals in the United States. This is because of the way that section 734.2 defines exports and reexports for encryption items.

For transfers of encryption technology within the United States, section 740.17(a)(2) of license exception ENC authorizes the export and reexport of encryption technology by a U.S. company and its subsidiaries to foreign nationals who are employees, contractors, or interns of a U.S. company . . . There is no definition of U.S. company in the EAR, however, BIS has interpreted this to apply to any company operating in the United States. This means that deemed export licenses are generally not required for the transfer of encryption technology by a company in the U.S. to its foreign national employees. A deemed export license may be required if, for example, a company operating in the U.S. were to transfer encryption technology to a foreign national who is not an employee, contractor, or intern of a company in the United States. License exception ENC does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

For deemed reexports, the end-user would have to be an employee, contractor, or intern of a U.S. Subsidiary for 740.17(a)(2) to apply, or a private sector end-user headquartered in a Supplement 3 country for 740.17(a)(1) to apply. The term contractor in this context means a contract employee (i.e., a human person). License exception ENC does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

Also note that as of June 25, 2010, encryption technology (except technology for cryptanalytic items, Open Cryptographic Interface items, and non-standard cryptography) that has been reviewed is eligible for license exception ENC to any non-government end user located outside of Country Group D:1. Also, encryption source code that has been reviewed by BIS and made eligible for license exception ENC under 740.17(b)(2) is eligible for export and reexport to any non-government end-user. Thus encryption technology and source code that have been reviewed are eligible for export and reexport to a broader range of end-users than 740.17(a) allows. Again, section 740.17 does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

18. Does the EAR definition of "OAM" include using encryption in performing network security monitoring functions?

No. The definition of "OAM" includes "monitoring or managing the operating condition or performance of an item." BIS does not consider network security monitoring or network forensics functions to be part of monitoring or managing operating condition or performance.

The phrase "monitoring or managing the operating condition or performance of an item" is meant to include all the activities associated with keeping a computer or network-capable device in proper operating condition, including: configuring the item; checking or updating its software; monitoring device error or fault indicators; testing, diagnosing or troubleshooting the item; measuring bandwidth, speed, available storage (e.g. free disk space) and processor / memory / power utilization; logging uptime / downtime; and capturing or measuring quality of service (QoS) indicators and Service Level Agreement-related data.

However, the "OAM" definition does not apply to cryptographic functions performed on the forwarding or data plane, such as: decrypting network traffic to reveal or analyze content (e.g., packet inspection and IP proxy services); encrypting cybersecurity-relevant data (e.g., activity signatures, indicators or event data extracted from monitored network traffic) over the forwarding plane; or securing the re-transmission of captured network activity.

Thus, products that use encryption for such network security monitoring or forensics operations, or to provision these cryptographic services, would not be released by the OAM decontrol notes (l) or (m), or the Note to 5D002.c.

Similarly, the "OAM" decontrol does not apply to security operations directed against data traversing the network, such as capturing, profiling, tracking or mapping potentially malicious network activity, or "hacking back" against such activity.

Back to top

Original post:
Encryption FAQs

Review: DiskCryptor a worthwhile encryption program that’s …

Encrypt entire drives with DiskCryptor, which runs as a service and is configured via a dialog. This free, open-source encryption utility also works in Windows 8 desktop mode.

Freelance Writer, PCWorld

DiskCryptor (free) is a handy encryption programsimple, to the point, and lightweight.

My preference is to encrypt entire drives and partitions, which is the level at which I organize my data these days, and that's exactly what DiskCryptor doeseven with your system partition. The program takes that one further and will encrypt ISO files that you may then burn to CD. If you need encrypted container files, look to TrueCrypt or others.

After you install DiskCryptor, it runs as a service in the background with an icon in the system tray. You can set it up to load from your boot sector if you've encrypted your system drive. Click on the system tray icon and you're presented with a plain, down-to-business dialog from which you encrypt/decrypt (AES 256, Two-fish, Serpent) as well as mount and unmount encrypted drives. The program uses only a little over 1MB of disk space installed.

There are a few peculiarities with DiskCryptor that you should be aware of. When you unmount an encrypted drive, it's still visible to the system, as well as Windows Disk management, but isn't recognized as a validly formatted or partitioned drive. This could lead someone to think the drive is corrupt and repartition or reformat ita hide drive function would be nice. It would also be nice to have context menu support so you don't have to go through the dialog for everything. But that's a lot of complaining for a program that's free, easy, convenient, and works extremely well.

DiskCryptor encrypts at the sector, not file level, so converting a drive one way or the other can take a while. In my hands-on, the program worked perfectly and encrypted a 64GB USB 3.0 flash drive in about 20 minutes, or 50MBps on a fast Core i7 system. Decrypting was considerably slower at about 20MBps. Copying files to the flash drive proceeded at about 55MBpsencrypted or not.

DiskCryptor is lightweight, seems reliable, and doesn't noticeably impact system performance. It doesn't offer the same wealth of options as TrueCrypt, but if you need only drive and partition-level encryption, then DiskCryptor's a worthwhile alternative.

Note: The "Try it for free" button on the Product Information page will download the software to your system.

Jon is a Julliard-trained musician, self-taught programmer, and long-time (late 70s) computer enthusiast living the San Francisco Bay Area. More by Jon L. Jacobi

Your message has been sent.

There was an error emailing this page.

Go here to read the rest:
Review: DiskCryptor a worthwhile encryption program that's ...

Who is Chelsea Manning? | American Civil Liberties Union

Whistleblower. Traitor. Transwoman. Freak. Hero.

Chelsea Manning has been called many things and is recognizable to many.

She has informed the public of United States military activities across the globe and continues to speak out against government secrecy and in defense of transgender rights.Her words and actions have powerfully transformed national conversations, but since her arrest in 2010 on charges related to her release of information to WikiLeaks, few have had a chance to actually see and hear from Chelsea herself.

Today, Chelsea is telling her story through an Amnesty International podcast. You can listen here.

I feel like I've been stored away for all this time without a voice, she says through the voice of transgender actress Michelle Hendley, who sounds eerily like Chelsea. I feel like there's so much of a contribution to society that I could be making. I spend every day looking forward to the hope that one day I can give that a go.

During the podcast, Chelsea recounts her early childhood and young adulthood struggling with her gender and homelessness. She talks about her decision to enlist in the military in October of 2007 as well as her arrest and brutal torture while in confinement at Quantico. She finishes up her story describing her incarceration at the Disciplinary Barracks at Fort Leavenworth. The story is in Chelseas own voice, with the earnest thoughtfulness that I have come to appreciate as quintessentially Chelsea.

As her lawyer, I am one of a few people who can speak to and visit Chelsea. I have had the privilege of hearing her voice and learning about the strong and resilient person that is behind the many public narratives and labels. With todays podcast, Chelsea hopes to share that side of her with others. Even though she is not permitted to use her actual voice, having another trans woman tell her story was critical to her as she continues to try to build human connections beyond the prison walls.

At the end of the podcast, Chelsea reflects on her younger self:

I've imagined a few times what it would be like if I could travel back in time and speak to myself as a teenager. I know what she was feeling deep down inside. I know all the fears that she had, and all the vulnerabilities she was hiding. I would want to grab her by the hand and tell her that everything is going to be okay. I would tell her that there is nothing wrong with you, and that you are more loved and appreciated than you realize. I would tell her that she can be a happier and healthier person if she stays true to herself, like I have finally been able to figure out.

One of the amazing things about Chelsea is her ability to find beauty and love, even in the most desperate circumstances. It comes through in her story and leaves you hopeful for a more just world a world where we can break down the isolation and violence of incarceration and build up the humanity and decency of our fellow human beings.

Continue reading here:
Who is Chelsea Manning? | American Civil Liberties Union

US government jet lay in wait for Snowden in Copenhagen …

Edward Snowden is interviewed by the Swedish daily newspaper Dagens Nyheter in Moscow in October 2015. Photograph: Lotta Hardelin/AFP/Getty

A US government jet was lying in wait in Copenhagen to extradite the whistleblower Edward Snowden if he had come to Scandinavia after fleeing to Moscow in June 2013, the Danish government has revealed.

The twin-engined Gulfstream aircraft, which had previously been used to fly Abu Hamza to the US from the UK, landed shortly before the FBI called on Scandinavian police forces to arrest Snowden and hand him over for extradition.

Sren Pind, the justice minister, wrote to Danish MPs (pdf): The purpose of the aircrafts presence in Copenhagen airport is most likely to have been to have the opportunity to transport Edward Snowden to the United States if he had been handed over from Russia or another country.

Related: White House denies clearance to tech researcher with links to Snowden

This week, Pind confirmed to the Danish parliament that the aircraft had been given high-level permission to land in Copenhagen, but said he did not know the purpose of its visit.

I must note that my answer was not adequate at this point, he wrote in the letter, dated Thursday 4 February and revealed by MPs on Friday. Usually, information of this nature is confidential because of Denmarks relations with foreign states. In view of the impression that my earlier answer may have created, I think it proper to inform parliament thereof. The US authorities have also been informed.

The admission confirms speculation about the aircraft after enthusiasts in the UK saw the jet flying at very high altitude through Scottish airspace on its way to Copenhagen, as first reported in 2014 by the Register. The Gulfstream jet was identified by its registration number, N977GA, as the aircraft used to extradite radial Muslim cleric Abu Hamza, and other prisoners, to the US in 2012.

Denmarks state-owned air traffic control agency, Navair, granted N977GA permission to stay in Copenhagen from 25 to 27 June 2013, but with flexibility of three days either side of those dates, according to documents released by the justice ministry last week following a freedom of information request by Peter Kofod of the whistleblowing organisation Veron.

On 27 June 2013, the fugitive whistleblower was seeking an onward destination from Moscow, where he had fled from Hong Kong, after handing over to the Guardian thousands of top-secret documents revealing the spying activities of the US National Security Agency.At that time, the FBI wrote from the US embassy in Copenhagen to the police forces of Denmark, Norway, Sweden and Finland to say that Snowden was wanted for theft and espionage.

The US Department of Justice is prepared to immediately draft the necessary paperwork to request the extradition of Snowden to the US from whichever country he travels to from Moscow, the letter, dated 27 June, states. The FBI expresses its gratitude for any assistance that can be provided on this important matter.

Redacted emails among the documents released by the Danish government reveal high-level discussion about N977GA between Danish police and top civil servants between 25 and 27 June. Permission for the jet to land was granted on 24 June.

The United States took drastic methods in trying to grab Snowden in the summer of 2013: a plane carrying the president of Bolivia, Evo Morales, was forced to land in Vienna because of rumours that Snowden was on board.

The Danish government has always insisted that it would cooperate with requests by its allies to help bring criminals to justice. However, the revelation that Denmark was prepared to cooperate with the extradition of Snowden from Scandinavia is embarrassing to the former coalition government led by Social Democratic prime minister Helle Thorning-Schmidt.

Josephine Fock, MP for the Alternative party, said: At the time the aircraft was given permission to land in Copenhagen, the US had not yet given assurances that Snowden would not face the death penalty or torture Denmark does not extradite people to such countries.

Related: Edward Snowden: US has not offered me plea deal

The US attorney general wrote to his Russian counterpart only in July 2013, a month later, to say that the charges faced by Snowden did not carry the death penalty.

Nicholaj Villumsen, MP and foreign affairs spokesman for the Red Green Alliance, said: It is grotesque that the then government put the interests of the United States above citizens freedoms. They violated fundamental democratic rights. We owe Edward Snowden a big thank you for his revelations of illegal US mass surveillance. Denmark should therefore in no way participate in the hunt for him.

The clear intention of the Danish government to cooperate with the US over Snowden suggested that Scandinavian governments would probably do the same with Julian Assange, were he to travel to Sweden to face rape allegations, Villumsen said. Assanges insistence that he faces a risk of extradition was a central aspect of his appeal to the UN working group on arbitrary detention, which on Friday ruled in his favour.

See the original post here:
US government jet lay in wait for Snowden in Copenhagen ...

Snowden (film) – Wikipedia, the free encyclopedia

Snowden is an upcoming American biographical political thriller film directed by Oliver Stone and written by Stone and Kieran Fitzgerald. The film is based on the book The Snowden Files by Luke Harding. The film stars Joseph Gordon-Levitt, Shailene Woodley, Scott Eastwood, Melissa Leo, Timothy Olyphant, Zachary Quinto, Nicolas Cage and Tom Wilkinson. Filming began on February 16, 2015 in Munich, Germany. Snowden is scheduled to be released in North America on May 13, 2016, by Open Road Films.

The true story follows Edward Snowden, an American computer professional who leaked classified information from the National Security Agency (NSA) to The Guardian in June 2013.

On June 2, 2014, it was announced that Oliver Stone and Moritz Borman acquired the rights to the nonfiction book The Snowden Files by Luke Harding, and that Stone would write and direct a film based on it.[1] On June 10, 2014, Stone acquired the rights to another book, Time of the Octopus by Anatoly Kucherena. Stone would use both books as the sources to write his screenplay.[2] On November 6, 2014, Open Road Films acquired the U.S. rights to the film, while Wild Bunch was set to handle foreign sales.[3]Deadline confirmed on November 10, 2014 that Endgame Entertainment had boarded the film to produce.[4] In April 2015, WikiLeaks revealed that Stone paid $700,000 for the rights to Harding's book and $1 million for rights to Kucherena's novel.[5]

On September 21, 2014, Joseph Gordon-Levitt was in talks to play Edward Snowden, the American computer professional who leaked classified information from the National Security Agency (NSA) to the mainstream media starting in June 2013.[6] On November 10, 2014, news confirmed that Levitt would be starring in the lead role.[7] On November 14, 2014, Shailene Woodley was in final talks to join the film to play Snowden's girlfriend, Lindsay Mills.[8] On February 2, 2015, Scott Eastwood joined the cast to play an NSA agent.[9] On February 4, 2015, three more actors joined the cast; Melissa Leo will play documentary filmmaker Laura Poitras, Zachary Quinto will play Glenn Greenwald, the journalist chosen by Snowden to leak sensitive information, and Tom Wilkinson will play Ewen MacAskill, defense and intelligence correspondent for The Guardian, who helped report the Snowden story.[10] On February 13, 2015, Variety reported that Ben Schnetzer had also joined the film.[11] On February 19, 2015, Timothy Olyphant joined the film to star as a CIA agent who befriended Snowden before he fled to Russia,[12] and Rhys Ifans and Joely Richardson were added to the cast of the film on February 20, 2015.[13]Nicolas Cage also signed on to play the role of a former US Intelligence official on February 23, 2015.[14]Keith Stanfield was added to the cast on February 25, 2015 to play a National Security Administration co-worker and a close friend to Snowden.[15]

Filming began on February 16, 2015 in Munich, Germany.[16] Shooting was underway in Washington, D.C. in early-April.[17] Shooting in Hawaii began on April 15th and lasted until April 18th. The house used to film is on the same street Edward Snowden lived on. At the end of April, Hong Kong press reported that crews started filming in The Mira Hong Kong, followed by outdoor filming in some old buildings in To Kwa Wan.[18] Shooting lasted until mid-May.[13]

On February 20, 2015, Open Road Films set the film for a December 25, 2015 domestic release.[13]Path would release the film in France on December 30, 2015 and Universum Film would release in Germany on January 7, 2016.[13] However, in September 2015, Open Road moved the film from its Christmas Day release date to 2016. The studio did not give reasons for the delay, however The Hollywood Reporter reported that maybe it was because the film was not finished yet.[19] On October 7, 2015, the film was set for a May 13, 2016 release.[20]

See the rest here:
Snowden (film) - Wikipedia, the free encyclopedia

Email Encryption Solutions – Secure Email – Trend Micro USA

Effortless Key Creation

Unlike other solutions, Trend Micro Email Encryption features dynamic key generation, built with Trend Micro Private Post technology, eliminating the pre-enrollment and certificate management hassles of PKI encryption. All you need is a recipients email address to create encryption keys.

Hosted key management helps ensure the availability of encryption keys 24x7, providing password and key recovery without the need for IT involvement.

Our web-based Zero Download Reader enables your intended recipients to decrypt emails without requiring them to install client software and supports popular mobile devices running iOS, Android, and Blackberry. Plus, our solutions help you comply with the regulations and requirements of partners and customers by allowing you to secure both incoming and outgoing emails and attachments.

Our email encryption solutions minimize IT administration and lower overall costs thanks to all of the above: effortless key creation, hosted key management, plus ease of use for both senders and recipients.

Read analyst TCO white paper

Trend Micro Email Encryption saves time vs. PKI encryption Read analyst TCO white paper

Our client-based encryption plugs into Microsoft Outlook, making it easier for end users to select which emails should be encrypted. Secure, encrypted email is as simple as sending regular emailno special training is needed.

Free trial View datasheet

Compatible Operating Systems

CPU and Memory

Required Disk Space

Compatible Web Browsers

Compatible Email Clients

Compatible Smart Phone Operating Systems for Zero Download Reader

In my opinion, Trend Micro Endpoint Encryption should be considered an industry standard for data encryption in healthcare. As an IT leader, when you find a tool that works so wellyou keep [it] in your tool-box indefinitely. Rob Jones, Chief Technology Officer, Truman Medical Centers Read more (PDF)

This option for InterScan Messaging Security, automatically encrypts email at the gateway based on content policiesfor a critical layer of data protection that doesnt rely on end user discretion. A recipients email address is all thats needed to create encryption keys, lifting the burden from IT staff.

Free trialView datasheet

Its faster to deploy and easier to manage

Its become a necessity See analyst white paper

Policy-based encryption from Trend Micro automatically enforces compliance requirements and protects confidential informationall while minimizing administration and lowering TCO. This service integrates seamlessly with Trend Micro Hosted Email Securityfor comprehensive messaging security in a fully hosted solution.

Free trial View datasheet

As a hosted service, Trend Micro Hosted Email Security does not require additional hardware or software located on your premises since all scanning hardware and software is operated and maintained offsite at Trend Micros secure datacenters.

To access your local Hosted Email Security administration account, a personal computer with Internet access and either Microsoft Internet Explorer 6.0 or 7.0 , or Mozilla Firefox 2.0, and JavaScript and Sun Java Runtime Environment (JRE) 1.4 or higher is required.

To start using Hosted Email Security, environments must also have an existing Internet gateway or workgroup SMTP connection and access to the DNS mail exchange record required to redirect the MX mail host record. If you have hosted email, then contact your service provider for more information or configuration help in redirecting your MX record.

Quality Life Services simplifies compliance with Hosted Email Encryption Read case study

Continued here:
Email Encryption Solutions - Secure Email - Trend Micro USA

Can Edward Snowden vote in the 2016 elections?

Edward Snowden is the worlds most wanted man. He faces charges related to espionage and theft of government property for leaking classified NSA documents to journalists. He is actively evading U.S. law enforcement by living under asylum inRussia.

So, can he still vote in the2016 election?

Absolutely, yes, according to Ben Wizner, leading U.S. attorney for Snowden and director of the Speech, Privacy, and Technology Project at the American Civil Liberties Union.

The short answer is: Hes eligible, Wizner told the Daily Dot when asked about Snowdens voter status. Theres no legal basis whatsoever for depriving Edward Snowden of the right to vote. Hes been convicted of no crime, much less one that would strip him of his civil rights.

Two and a half years after his leak of secret National Security Agency documents, Snowden remains at the center of the ongoing debate over the balance between civil liberties and security. Whoever becomes the next president of the United States must grapple with this issue in a post-Snowden world, making his ability to actually vote for his candidate of choice all that more important, if only symbolically.

He has every much right to vote as any other American citizen, added Wizner, who took on Snowdens case shortly after the North Carolina native turned 30 and became stranded in the transit zone of Moscow airport.

Before absconding to Hong Kong in May 2013, Snowden rented a three-bedroom house in the Waipahu community of Oahu. He had arrived on Hawaiis most populous island in March 2012, after accepting a technologist position with Dell, a leading U.S. government contractor.

To vote in Hawaii, Snowden need only be registered and considered a resident of the state. (His attorney declined to confirm his residency status.) Without a conviction, the charges against him, which carry a penalty of up to 30 years in prison, have no bearing on his voter eligibility.

Im not aware of any state that disenfranchise people accused of crimes, said Richard Hasen, a professor of law and political science at the University of California, Irvine. If he did not renounce his citizenship and intends to return to Hawaii, my guess is he could request an absentee ballot. But again, it is a matter of state law.

With regards to voting, Hawaii has some of the most relaxed laws in the country. Voting rights can only be suspended while a convicted felon is serving prison time. Even while on parole or probation, a released felon can participate in an election by re-registering with the state's election office at a minimum of seven days in advance.

Only in Maine and Vermont are the laws more laid back, permitting convicted felons to complete absentee ballots from behind bars.

At the other end of the spectrum, 11 statesAlabama, Arizona, Delaware, Florida, Iowa, Kentucky, Mississippi, Nevada, Tennessee, Virginia, Wyomingreserve the right to permanently strip residents of the vote due to past crimes.

And in eight U.S. statesIdaho, Illinois, Indiana, Kentucky, Michigan, Missouri, South Carolina, and South Dakotabeing incarcerated for a low-level misdemeanor means a suspension of voting rights.

With the worlds most populous prison system, America's felony disenfranchisement significantly reduces the number of votes on election day. An estimated 5.85 million Americans will be denied the right to vote in the 2016 presidential elections due to a criminal record, according to the U.S. Bureau of Justice Statistics, disproportionately affecting racial and ethnic minorities who now make up 60 percent of the U.S. prison population.

Of the 2.2 million Americans incarcerated, more than 200,000 are under the federal governments control. As of Sept. 30, 2014, 50 percent of them were serving time for drug offenses.

Even more striking is that, while only making up one-third of the population, two-thirds of all incarcerated drug offenders are people of color, despite research showing white Americans consume illicit drugs at a far greater rate than their minority counterparts.

According to the Sentencing Project, oneof every 13African-Americans will be ineligible to vote in the upcoming election.

Illustration by Max Fleishman

Continued here:
Can Edward Snowden vote in the 2016 elections?

Data Encryption | IT Security – East Carolina University

Are You Responsible for Sensitive Data?

Do you store sensitive information on your workstation, laptop, flash drive or mobile device? Do you email sensitive data to persons outside the ECU network? If so, you should encrypt these files and emails to protect them from unauthorized access or theft. Read on to learn categories of sensitive data and a few simple tools you can use to add a significant layer of protection to your information.

Sensitive data includes the following:

Encryption scrambles data to make it unreadable. Only persons with the password key can unscramble, or decrypt, the information. This not only prevents identity theft but also protects you and the university from unnecessary liability if your device or email is stolen, hacked or otherwise breached.

From the Start button, type BitLocker into the search. Choose BitLocker Drive Encryption.

All faculty and staff have encryption enabled and are required to encrypt messages containing sensitive information when addressed to recipients outside the ECU network. For example, do you send HIPAA information to users at Vidant? Then encrypt these messages before sending. Messages sent within the ECU network do not need to be encrypted.

Its easy to encrypt email. Follow the instructions found at http://www.ecu.edu/cs-itcs/email/encryption.cfm. There are also printable instructions for decryption that can be sent to recipients.

Read more:
Data Encryption | IT Security - East Carolina University

Introduction to Encryption & Cryptography – ArticSoft PGP

Make any enquiry about computer security, and you will almost immediately fall over the terms cryptography and encryption (and also decryption), but what exactly is meant by this?

The dictionary (in my case the Oxford English), defines cryptography as hidden writing. It has been around for a very long time. The Ancient Egyptians, the Arabs and the Romans developed their own encryption systems.

Cryptography is used whenever someone want to send a secret message to someone else, in a situation where anyone might be able to get hold of the message and read it. It was often used by generals to send orders to their armies, or to send messages between lovers. The most famous encryption machine invented was the Enigma, used in the Second World War to send military messages. (Several books and at least one film have featured Enigma encryption.)

One of the best examples of early cryptography is the Caesar cipher, named after Julius Caesar because he is thought to have used it even if he didn't actually invent it.

It works like this. Take a piece of paper and write along the top edge the alphabet. Take another piece of paper and do the same thing. You should then have two lines of letters like this:

Now write your message. SEND MONEY TONIGHT

Move one of your pieces of paper along to the right one or more letters so that they no longer line up. That should look like this:

Now every time you see a letter of your message in the top line, write down instead the letter on the bottom line.

SEND MONEY TONIGHT becomes

QCLB KMLCW RMLGEFR

What you have done is performed a cryptographic transformation (encrypted) your message. To do it you have used an algorithm (for each letter in your message, move a number of locations on in the alphabet and write that one down instead) and an encryption key, in this case the value 2 because we moved A two places forwards on the bottom line.

All we have to do now is make sure that the person receiving our message knows the encryption key and the algorithm. As long as they know it's the Caesar cipher and the encryption key is 2 they can put their lower line two places to the right, and by taking each letter of the message and writing down the letter immediately above it, they can re-create the original message.

However, if you think about it, the Caesar cipher wasn't all that brilliant. After all, it didn't have many encryption keys. A value of zero meant that you didn't actually encrypt anything, as did 26 because it also moved A under A. An enemy, knowing that was the algorithm, therefore only had to try a relatively small number of encryption keys before finding yours. By just trial and error he could run quickly through all 25 possible encryption keys on just the first word. As soon as he finds a real word the system is broken.

Until we started using computers, these ciphers, with very much better algorithms and much more complex encryption keys were the order of the day. However, the basic approach to this way of creating secret messages has not really changed. So now you understand the basic method used in any symmetric cipher.

Taking our example above, the operation is as follows:

now you have an encrypted message (ciphertext). The recipient then:

Now they have the original message back (plaintext). This is called a symmetric cipher because you use the same algorithm and the same key to carry out both encryption and decryption. There are other types of cipher systems but they are covered in other encryption white papers.

The quality of the algorithm and encryption key combination (as we saw with the Caesar cipher, making the key bigger on its own did not actually make the encryption any stronger at all) were the factors that made the strength of the system. However, until there was some automation you could not use really complex methods because it simply took too long to encrypt and decrypt messages.

Thanks to computers we are now able to do these things much faster and better than Caesar, or, indeed Enigma. There are many encryption algorithms available far harder to break than the Caesar cipher. These encryption algorithms have strange names, such as Rijndahl, Blowfish, RC2, RC4, Triple DES, CAST. They have key sizes that are enormous by comparison to our Caesar cipher.

Of course, just as computers are able to operate such powerful encryption algorithms, computers can be harnessed to break them. The encryption algorithm DES (Data Encryption Standard) in use for many years to protect banking transactions was considered very strong until the University of Cambridge published a design for a custom machine to break the cipher in minutes, for a manufacturing cost of under $1 million. Fortunately, the encryption algorithms mentioned above are still considered effective.

There are many books available describing encryption and cryptography, either as a history or as a mathematical system or as a guide to use and implementation. The following is a very short list of books appealing to each group.

Originally posted here:
Introduction to Encryption & Cryptography - ArticSoft PGP

The Apple encryption debate… in 2 minutes – Feb. 18, 2016

Tim Cook has said following through with the court order would endanger its customers. Letting the FBI in would also give hackers an easier way in too, he argued.

Police everywhere are having a hard time keeping track of terrorists, because modern phones, including the iPhone, make it easier than ever to communicate privately.

1. Technology companies are increasingly using encryption to protect your data.

By translating your messages and private information into a string of seemingly random letters and numbers, encryption keeps your data out of the watchful eyes of hackers and government data collectors.

2. Terrorists are using encryption to "go dark."

When ISIS spots a possible recruit, they move conversations to direct person-to-person chatting apps that encrypt messages. Police can't monitor those messages.

3. Phones themselves are locked with encryption.

Apple and Google (GOOGL, Tech30) are encrypting data stored on iPhones and Android phones. When police obtain a suspect's or victim's device, police have a difficult time breaking in if the phone is locked with a passcode.

4. That makes evidence seizure difficult for law enforcement.

Traditionally, police obtain a court-ordered search warrant to seize evidence. Then they approach a tech company and demand to see a customer's information. But those court orders are increasingly worthless because many tech companies no longer hold the encryption keys -- they couldn't unlock their customers' data, even if they wanted to.

5. You control your own encryption keys.

Instead, customers have the keys, in the form of a smartphone passcode. Only you can unlock your iPhone -- Apple doesn't know or store your password.

6. Law enforcement still demands access.

FBI Director James Comey wants tech companies to figure out a way to let in police anyway. Comey suggests Apple (AAPL, Tech30), Microsoft (MSFT, Tech30) and others design "doors" into products with a second set of keys for law enforcement.

7. The tech industry and experts say those doors are a bad idea

The world's top cryptographers issued a joint statement last July, calling the FBI's attempts "mandating insecurity." They describe this in binary terms: either data is secured against everyone -- or it's not. 48 companies and 37 civil society groups took a similar stand, worrying that hackers could exploit those doors.

8. Government can't regulate encryption anyway.

Encryption is software that's easy to replicate and share. Much of it is free. Even if law enforcement got the extra access it seeks, terrorists and criminals could just use software or devices made outside the United States. Terrorists acquire illegal assault rifles. They'll get encryption too.

CNNMoney (New York) First published February 18, 2016: 10:58 AM ET

View original post here:
The Apple encryption debate... in 2 minutes - Feb. 18, 2016